Sciweavers

116 search results - page 20 / 24
» An End Host Multicast Protocol for Peer-to-Peer Networks
Sort
View
LCN
2003
IEEE
14 years 27 days ago
Evaluating System Performance in Gigabit Networks
- With the current wide deployment of Gigabit Ethernet technology in the backbone and workgroup switches, the network performance bottleneck has shifted for the first time in nearl...
Khaled Salah, K. El-Badawi
SECURWARE
2007
IEEE
14 years 1 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
INFOCOM
2005
IEEE
14 years 1 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
INFOCOM
2007
IEEE
14 years 1 months ago
Evolutionary Approaches To Minimizing Network Coding Resources
Abstract— We consider the problem of minimizing the resources used for network coding while achieving the desired throughput in a multicast scenario. Since this problem is NPhard...
Minkyu Kim, Muriel Médard, Varun Aggarwal, ...
TRIDENTCOM
2005
IEEE
14 years 1 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau